2014
DOI: 10.1016/j.diin.2014.03.012
|View full text |Cite|
|
Sign up to set email alerts
|

OBA2: An Onion approach to Binary code Authorship Attribution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
45
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 64 publications
(45 citation statements)
references
References 2 publications
0
45
0
Order By: Relevance
“…Counting the number of compare instructions, Checking the registers for each compare instruction, Checking the flow of each register from the beginning until the compare is reached, Classifying the register changes according to the 15 proposed classes in Alrabaee et al (2014).…”
Section: Register Flow Graphmentioning
confidence: 99%
See 1 more Smart Citation
“…Counting the number of compare instructions, Checking the registers for each compare instruction, Checking the flow of each register from the beginning until the compare is reached, Classifying the register changes according to the 15 proposed classes in Alrabaee et al (2014).…”
Section: Register Flow Graphmentioning
confidence: 99%
“…A Register Flow Graph (RFG) is used to capture how registers are manipulated by binary code, which is originally designed for authorship identification of binary code (Alrabaee et al, 2014). RFGs describe the flow and dependencies between registers as an important semantic aspect of the behavior of a program, which might indicate authorship as well as functionality.…”
Section: Register Flow Graphmentioning
confidence: 99%
“…Machine learning techniques are then applied to rank these features based on their relative correlations with authorship. A subsequent approach to automatically identify the authorship of software binaries is proposed by Alrabaee et al [13]. The main concept employed by this method is to extract a sequence of instructions with specific semantics and to construct a graph based on register manipulation, where a machine learning algorithm is applied afterwards.…”
Section: Binary Code Authorship Attributionmentioning
confidence: 99%
“…Register Flow Graph: This graph captures the flow and dependencies between the registers that annotated to cmp instruction [13]. Such graph can capture an important semantic aspects about the behavior of a program, which might indicate the authors skills or habits.…”
Section: Features Of Binary Filesmentioning
confidence: 99%
“…Attributing authorship of source codes with unknown authors has been studied extensively for several decades but less so for binaries. In some prominent studies such as [14], [2], authors have utilized machine learning techniques to correlate syntax-based features with authorship to identify the author of program binaries. In [3], authors have analyzed the effects of compiler optimization (in three levels), removing symbol information and applying basic binary obfuscation methods (such as instruction replacement and control flow graph obfuscation) on several features mainly obtained from disassembling and decompiling the executable binaries (e.g.…”
Section: Other Methods Of Protecting Binariesmentioning
confidence: 99%